Chemical Plant ICS Exploit - GRFICSv2
Exploiting a vulnerable chemical plant using a realistic simulation composed of five virtual machines representing the common components of industrial control systems.
Summary
This simulation assumes that an attacker has already gained access to an employee’s machine on a corporate network. The goal is to enumerate this network before pivoting to a poorly protected control network to cause physical damage to the chemical plant.